What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jianfeng Ma
Google Scholar
55
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Sensor attack online classification for UAVs using machine learning.
Xiaomin Wei
Yizhen Xu
Haibin Zhang
Cong Sun
Xinghua Li
Fenghua Huang
Jianfeng Ma
2025
journals/tifs
Trinity: A Scalable and Forward-Secure DSSE for Spatio-Temporal Range Query.
Zhijun Li
Kuizhi Liu
Minghui Xu
Xiangyu Wang
Yinbin Miao
Jianfeng Ma
Xiuzhen Cheng
2025
journals/tifs
FedWiper: Federated Unlearning via Universal Adapter.
Shuai Zhao
Junying Zhang
Xindi Ma
Qi Jiang
Zhuo Ma
Sheng Gao
Zuobin Ying
Jianfeng Ma
2025
journals/tifs
Comparing Different Membership Inference Attacks With a Comprehensive Benchmark.
Jun Niu
Xiaoyan Zhu
Moxuan Zeng
Ge Zhang
Qingyang Zhao
Chunhui Huang
Yangming Zhang
Suyu An
Yangzhong Wang
Xinghui Yue
Zhipeng He
Weihao Guo
Kuo Shen
Peng Liu
Lan Zhang
Jianfeng Ma
Yuqing Zhang
2025
journals/tifs
FedGhost: Data-Free Model Poisoning Enhancement in Federated Learning.
Zhuoran Ma
Xinyi Huang
Zhuzhu Wang
Zhan Qin
Xiangyu Wang
Jianfeng Ma
2025
conf/ndss
L-HAWK: A Controllable Physical Adversarial Patch Against a Long-Distance Target.
Taifeng Liu
Yang Liu
Zhuo Ma
Tong Yang
Xinjing Liu
Teng Li
Jianfeng Ma
2025
journals/compsec
Impact assessment of third-party library vulnerabilities through vulnerability reachability analysis.
Zhizhuang Jia
Chao Yang
Pengbin Feng
Xiaoyun Zhao
Xinghua Li
Jianfeng Ma
2024
journals/tifs
Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data.
Yanrong Liang
Jianfeng Ma
Yinbin Miao
Yuan Su
Robert H. Deng
2024
journals/tifs
An Anti-Disguise Authentication System Using the First Impression of Avatar in Metaverse.
Zhenyong Zhang
Kedi Yang
Youliang Tian
Jianfeng Ma
2024
journals/tifs
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects.
Ruidong Han
Huihui Gong
Siqi Ma
Juanru Li
Chang Xu
Elisa Bertino
Surya Nepal
Zhuo Ma
Jianfeng Ma
2024
journals/tifs
Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings.
Chuang Tian
Jianfeng Ma
Teng Li
Junwei Zhang
Chengyan Ma
Ning Xi
2024
conf/ccs
Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz.
Qingsong Yao
Yuming Liu
Xiongjia Sun
Xuewen Dong
Xiaoyu Ji
Jianfeng Ma
2024
conf/ccs
Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness.
Hao Xiang
Zehui Cheng
Jinku Li
Jianfeng Ma
Kangjie Lu
2024
conf/acsac
VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs.
Yunbo Wang
Cong Sun
Qiaosen Liu
Bingnan Su
Zongxu Zhang
Michael Norris
Gang Tan
Jianfeng Ma
2023
journals/compsec
FCEVAL: An effective and quantitative platform for evaluating fuzzer combinations fairly and easily.
Xiaoyun Zhao
Chao Yang
Zhizhuang Jia
Yue Wang
Jianfeng Ma
2023
journals/tifs
A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse.
Kedi Yang
Zhenyong Zhang
Youliang Tian
Jianfeng Ma
2023
journals/tifs
SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid.
Zhenyong Zhang
Ruilong Deng
Youliang Tian
Peng Cheng
Jianfeng Ma
2023
journals/tifs
IAFDroid: Demystifying Collusion Attacks in Android Ecosystem via Precise Inter-App Analysis.
Bin Wang
Chao Yang
Jianfeng Ma
2023
journals/tifs
An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies.
Xiaoqin Feng
Jianfeng Ma
Huaxiong Wang
Yinbin Miao
Ximeng Liu
Zhongyuan Jiang
2023
conf/ccs
Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications.
Nanzi Yang
Wenbo Shen
Jinku Li
Xunqi Liu
Xin Guo
Jianfeng Ma
2023
conf/ccs
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery.
Boyang Ma
Yilin Yang
Jinku Li
Fengwei Zhang
Wenbo Shen
Yajin Zhou
Jianfeng Ma
2023
conf/ccs
TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis.
Ziyi Lin
Jinku Li
Bowen Li
Haoyu Ma
Debin Gao
Jianfeng Ma
2023
conf/uss
Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding.
Jietao Xiao
Nanzi Yang
Wenbo Shen
Jinku Li
Xin Guo
Zhiqiang Dong
Fei Xie
Jianfeng Ma
2023
conf/provsec
Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections.
Hao Zhu
Fagen Li
Lihui Liu
Yong Zeng
Xiaoli Li
Jianfeng Ma
2023
conf/esorics
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage.
Feng Li
Jianfeng Ma
Yinbin Miao
Pengfei Wu
Xiangfu Song
2022
journals/tifs
STOP: A Service Oriented Internet Purification Against Link Flooding Attacks.
Ning Lu
Junwei Zhang
Ximeng Liu
Wenbo Shi
Jianfeng Ma
2022
journals/tifs
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning.
Zhuoran Ma
Jianfeng Ma
Yinbin Miao
Yingjiu Li
Robert H. Deng
2021
journals/tifs
Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees.
Xiangyu Wang
Jianfeng Ma
Feng Li
Ximeng Liu
Yinbin Miao
Robert H. Deng
2021
conf/ccs
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Nanzi Yang
Wenbo Shen
Jinku Li
Yutian Yang
Kangjie Lu
Jietao Xiao
Tianyu Zhou
Chenggang Qin
Wang Yu
Jianfeng Ma
Kui Ren
2020
journals/compsec
A secured TPM integration scheme towards smart embedded system based collaboration network.
Di Lu
Ruidong Han
Yue Wang
Yongzhi Wang
Xuewen Dong
Xindi Ma
Teng Li
Jianfeng Ma
2020
journals/compsec
RansomSpector: An introspection-based approach to detect crypto ransomware.
Fei Tang
Boyang Ma
Jinku Li
Fengwei Zhang
Jipeng Su
Jianfeng Ma
2020
journals/tifs
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources".
Xu An Wang
Kim-Kwang Raymond Choo
Jian Weng
Jianfeng Ma
2020
conf/sec
IMShell-Dec: Pay More Attention to External Links in PowerShell.
Ruidong Han
Chao Yang
Jianfeng Ma
Siqi Ma
Yunbo Wang
Feng Li
2019
journals/compsec
Selfholding: A combined attack model using selfish mining with block withholding attack.
Xuewen Dong
Feng Wu
Anter Faree
Deke Guo
Yulong Shen
Jianfeng Ma
2019
conf/acisp
MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone.
Xiaojian Pang
Li Yang
Maozhen Liu
Jianfeng Ma
2019
conf/esorics
Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.
Jianghong Wei
Xiaofeng Chen
Jianfeng Wang
Xuexian Hu
Jianfeng Ma
2019
conf/cans
Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation.
Yuting Cheng
Li Yang
Shui Yu
Jianfeng Ma
2018
journals/compsec
SADUS: Secure data deletion in user space for mobile devices.
Li Yang
Teng Wei
Fengwei Zhang
Jianfeng Ma
2018
journals/tifs
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
Meixia Miao
Jianfeng Ma
Xinyi Huang
Qian Wang
2018
journals/tifs
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels.
Jinku Li
Xiaomeng Tong
Fengwei Zhang
Jianfeng Ma
2018
conf/cns
Inference Attack in Android Activity based on Program Fingerprint.
Li Yang
Teng Wei
Jianfeng Ma
Shui Yu
Chao Yang
2017
journals/tifs
Secure and Efficient Cloud Data Deduplication With Randomized Tag.
Tao Jiang
Xiaofeng Chen
Qianhong Wu
Jianfeng Ma
Willy Susilo
Wenjing Lou
2017
conf/icics
FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure.
Ruo Mo
Jianfeng Ma
Ximeng Liu
Qi Li
2016
journals/compsec
Secure, efficient and revocable multi-authority access control system in cloud storage.
Qi Li
Jianfeng Ma
Rui Li
Ximeng Liu
Jinbo Xiong
Danwei Chen
2016
conf/acisp
Towards Efficient Fully Randomized Message-Locked Encryption.
Tao Jiang
Xiaofeng Chen
Qianhong Wu
Jianfeng Ma
Willy Susilo
Wenjing Lou
2015
journals/tifs
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
Xiaofeng Chen
Xinyi Huang
Jin Li
Jianfeng Ma
Wenjing Lou
Duncan S. Wong
2014
conf/esorics
Verifiable Computation over Large Database with Incremental Updates.
Xiaofeng Chen
Jin Li
Jian Weng
Jianfeng Ma
Wenjing Lou
2013
journals/tifs
TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing.
Sheng Gao
Jianfeng Ma
Weisong Shi
Guoxing Zhan
Cong Sun
2013
conf/ccs
PRAM: privacy preserving access management scheme in cloud services.
Jinbo Xiong
Zhiqiang Yao
Jianfeng Ma
Ximeng Liu
Qi Li
Tao Zhang
2013
conf/esorics
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Jin Li
Xiaofeng Chen
Jingwei Li
Chunfu Jia
Jianfeng Ma
Wenjing Lou
2012
conf/esorics
New Algorithms for Secure Outsourcing of Modular Exponentiations.
Xiaofeng Chen
Jin Li
Jianfeng Ma
Qiang Tang
Wenjing Lou
2011
conf/icics
A Multi-compositional Enforcement on Information Flow Security.
Cong Sun
Ennan Zhai
Zhong Chen
Jianfeng Ma
2010
journals/compsec
Stability analysis of a SEIQV epidemic model for rapid spreading worms.
Fangwei Wang
Yunkai Zhang
Changguang Wang
Jianfeng Ma
Sang-Jae Moon
2009
journals/compsec
Defending passive worms in unstructured P2P networks based on healthy file dissemination.
Fangwei Wang
Yunkai Zhang
Jianfeng Ma
2006
conf/acns
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan.
Xinghua Li
Sang-Jae Moon
Jianfeng Ma
Coauthors
Anter Faree
(1)
Bin Wang
(1)
Bingnan Su
(1)
Bowen Li
(1)
Boyang Ma
(2)
Chang Xu
(1)
Changguang Wang
(1)
Chao Yang
(5)
Chenggang Qin
(1)
Chengyan Ma
(1)
Chuang Tian
(1)
Chunfu Jia
(1)
Chunhui Huang
(1)
Cong Sun
(4)
Danwei Chen
(1)
Debin Gao
(1)
Deke Guo
(1)
Di Lu
(1)
Duncan S. Wong
(1)
Elisa Bertino
(1)
Ennan Zhai
(1)
Fagen Li
(1)
Fangwei Wang
(2)
Fei Tang
(1)
Fei Xie
(1)
Feng Li
(3)
Feng Wu
(1)
Fenghua Huang
(1)
Fengwei Zhang
(4)
Gang Tan
(1)
Ge Zhang
(1)
Guoxing Zhan
(1)
Haibin Zhang
(1)
Hao Xiang
(1)
Hao Zhu
(1)
Haoyu Ma
(1)
Huaxiong Wang
(1)
Huihui Gong
(1)
Jian Weng
(2)
Jianfeng Ma
(55)
Jianfeng Wang
(1)
Jianghong Wei
(1)
Jietao Xiao
(2)
Jin Li
(4)
Jinbo Xiong
(2)
Jingwei Li
(1)
Jinku Li
(8)
Jipeng Su
(1)
Juanru Li
(1)
Jun Niu
(1)
Junwei Zhang
(1)
Junwei Zhang
(1)
Junying Zhang
(1)
Kangjie Lu
(2)
Kedi Yang
(2)
Kim-Kwang Raymond Choo
(1)
Kui Ren
(1)
Kuizhi Liu
(1)
Kuo Shen
(1)
Lan Zhang
(1)
Li Yang
(4)
Lihui Liu
(1)
Maozhen Liu
(1)
Meixia Miao
(1)
Michael Norris
(1)
Minghui Xu
(1)
Moxuan Zeng
(1)
Nanzi Yang
(3)
Ning Lu
(1)
Ning Xi
(1)
Peng Cheng
(1)
Peng Liu
(1)
Pengbin Feng
(1)
Pengfei Wu
(1)
Qi Jiang
(1)
Qi Li
(3)
Qian Wang
(1)
Qiang Tang
(1)
Qianhong Wu
(2)
Qiaosen Liu
(1)
Qingsong Yao
(1)
Qingyang Zhao
(1)
Robert H. Deng
(3)
Rui Li
(1)
Ruidong Han
(3)
Ruilong Deng
(1)
Ruo Mo
(1)
Sang-Jae Moon
(2)
Sheng Gao
(2)
Shuai Zhao
(1)
Shui Yu
(2)
Siqi Ma
(2)
Surya Nepal
(1)
Suyu An
(1)
Taifeng Liu
(1)
Tao Jiang
(2)
Tao Zhang
(1)
Teng Li
(3)
Teng Wei
(2)
Tianyu Zhou
(1)
Tong Yang
(1)
Wang Yu
(1)
Weihao Guo
(1)
Weisong Shi
(1)
Wenbo Shen
(4)
Wenbo Shi
(1)
Wenjing Lou
(6)
Willy Susilo
(2)
Xiangfu Song
(1)
Xiangyu Wang
(3)
Xiaofeng Chen
(7)
Xiaojian Pang
(1)
Xiaoli Li
(1)
Xiaomeng Tong
(1)
Xiaomin Wei
(1)
Xiaoqin Feng
(1)
Xiaoyan Zhu
(1)
Xiaoyu Ji
(1)
Xiaoyun Zhao
(2)
Ximeng Liu
(6)
Xin Guo
(2)
Xindi Ma
(2)
Xinghua Li
(3)
Xinghui Yue
(1)
Xinjing Liu
(1)
Xinyi Huang
(3)
Xiongjia Sun
(1)
Xiuzhen Cheng
(1)
Xu An Wang
(1)
Xuewen Dong
(3)
Xuexian Hu
(1)
Xunqi Liu
(1)
Yajin Zhou
(1)
Yang Liu
(1)
Yangming Zhang
(1)
Yangzhong Wang
(1)
Yanrong Liang
(1)
Yilin Yang
(1)
Yinbin Miao
(6)
Yingjiu Li
(1)
Yizhen Xu
(1)
Yong Zeng
(1)
Yongzhi Wang
(1)
Youliang Tian
(3)
Yuan Su
(1)
Yue Wang
(2)
Yulong Shen
(1)
Yuming Liu
(1)
Yunbo Wang
(2)
Yunkai Zhang
(2)
Yuqing Zhang
(1)
Yutian Yang
(1)
Yuting Cheng
(1)
Zehui Cheng
(1)
Zhan Qin
(1)
Zhenyong Zhang
(3)
Zhijun Li
(1)
Zhipeng He
(1)
Zhiqiang Dong
(1)
Zhiqiang Yao
(1)
Zhizhuang Jia
(2)
Zhong Chen
(1)
Zhongyuan Jiang
(1)
Zhuo Ma
(3)
Zhuoran Ma
(2)
Zhuzhu Wang
(1)
Ziyi Lin
(1)
Zongxu Zhang
(1)
Zuobin Ying
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to